IT Security Best Practices

At UMB it is everyone’s job to actively fight spam and potential social engineering attacks. Use the tips below to give yourself an advantage when dealing with hackers trying to gain access to your personal data. Remember that the University will NEVER ask for your user login credentials in an email message. DO NOT reply to suspected attacks, always report them using the Phish Alert button. For more information on how to report Phishing and Spam email click here.

Use two-factor or multi-factor authentication (MFA) for all personal accounts or services that support this technology. 

Multi-factor authentication or MFA provides the strongest protection against hackers gaining access to your accounts if they happen to get your password. If you receive an alert from your MFA app that you were not expecting, DO NOT ACCEPT the request. Hackers may be attempting to gain access to your account with compromised credentials, and if you approve the MFA request, they have complete access to your account. They may be very persistent in trying to gain access; do not grant access just to silence the alerts. To learn more about how UMB uses MFA click here

Ensure that you are using antivirus protection, with regular updates. 

Install programs from a trusted source and keep the definitions up-to-date and enable automatic definition updates. 

Enable local firewall software on all computers. 

Local firewalls provide an additional layer of protection from hackers trying to exploit open ports.

Do not reuse passwords across accounts. Create a unique strong password for each account. 

Once a hacker has access to your username and password, they will try all of the larger banks and online merchants to see if the credentials will gain them access to additional sites. Use a password manager to automatically create and manage strong passwords for each online account you have.

Back up your important files on a regular basis using a secure, cloud-based file storage product. 

Current backups may be the only protection you have in the event that you experience a ransomware attack, and your hard drive is encrypted. Where possible, create local non-attached backups as well as online cloud backups of your computer weekly or at least monthly to ensure that you will not lose your personal data.

Secure computing devices and log off or shut down computers when they are not in use. 

Computers that are locked or shut down provide security from hackers or curious individuals trying to gain access to an open system. Users of UMB network resources are required to have a user password at startup and must “Lock Down" (or log out of) the computer each time it is left unattended. Individual user sessions also must initiate a password-protected screensaver after a period of no more than 30 minutes of inactivity. Never leave devices unattended.

Beware of suspicious emails and phone calls because they could be phishing scams and/or contain malware. 

Phishing scams are a constant threat. Using social engineering tactics, the hackers will try to trick you into clicking malicious links or divulging personal information that can be used to compromise your accounts.

Don’t click on unknown attachments or links 

Carefully examine links in emails before clicking on them. Identify where that link goes by hovering your cursor over the link without clicking. Your browser will show you the link address. Don’t click on it if it doesn’t go where you are expecting it to go.

Do not use public Wi-Fi unless you have implemented a VPN connection that utilizes MFA. 

Hackers will spoof Wi-Fi hotspots from popular public wireless areas hoping that an individual will not notice that they are not connected to the business Wi-Fi. They will collect all information transmitted by you and then use it later to gain access to your accounts. Using a VPN will encrypt your traffic, making it impossible for hackers to gain access to your credentials.

Visit the following links for additional resources on how to protect yourself and stay safe online:

National Cyber Security Alliance

International Travel Tips